Preferred Language
Articles
/
joe-2276
A Computerized Integrated System for Geodetic Networks Design
...Show More Authors

This research presents a model for surveying networks configuration which is designed and called a Computerized Integrated System for Triangulation Network Modeling (CISTNM). It focuses on the strength of figure as a concept then on estimating the relative error (RE) for the computed side (base line) triangulation element. The CISTNM can compute the maximum elevations of the highest
obstacles of the line of sight, the observational signal tower height, the contribution of each triangulation station with their intervisibility test and analysis. The model is characterized by the flexibility to select either a single figure or a combined figures network option. Each option includes three other implicit options such as: triangles, quadrilaterals, and central-point figures (which is to be subdivided into: triangle; quadrilateral, and pentagon). The model also has the property of the diverse modes of display for the output results; i.e. the results can be displayed in the shape of TwoDimensional (2-D) and Three- Dimensional (3-D) representations. Visual Basic is the software depended as a main core in designing CISTNM to draw the suggested network in 2-D to display the network point positions and formations, and it can be linked with the available software such as ArcMap (GIS). The input data which is used as an application of the targeted geodetic surveying techniques (triangulation) is Chamchamal region as a case study in this research. The area lies in the north of Iraq. The results obtained after this application and verification, have proved that the CISTNM
can perform the required task easily and accurately.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Darboux Integrability of a Generalized 3D Chaotic Sprott ET9 System
...Show More Authors

In this paper, the first integrals of Darboux type of the generalized Sprott ET9 chaotic system will be studied. This study showed that the system has no polynomial, rational, analytic and Darboux first integrals for any value of . All the Darboux polynomials for this system were derived together with its exponential factors. Using the weight homogenous polynomials helped us prove the process.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Dec 17 2022
Journal Name
Scientometrics
Implementation of a new research indicator to QS ranking system
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of a new orthodontic bonding system (Beauty Ortho Bond)
...Show More Authors

Background: The purpose of the current study was to evaluate the efficacy of a new orthodontic bonding system (Beauty Ortho Bond) involving the shear bond strength in dry and wet environments, and adhesion remnant index (ARI) scores evaluation in regard to other bonding systems (Heliosit and Resilience Orthodontic Adhesives). Materials and methods: Sixty defect free extracted premolars were randomly divided into six groups of 10 teeth each, mounted in acrylic resin, three groups for a dry environment and three for a wet one. Shear bond strength test was performed with a cross head speed of 0.5 mm/min, while surfaces of enamel and bracket-adhesive-enamel surfaces were examined with stereomicroscope For ARI scores evaluation. Data were analyz

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 30 2018
Journal Name
Journal Of Pure And Applied Microbiology
Mixture Design of Experiments for the Optimization of Carbon Source for Promoting Undecylprodigiosin and Actinorhodin Production
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2017
Journal Name
Ieee Transactions On Cognitive Communications And Networking
Multi-Channel Distributed DSA Networks: Connectivity and Rendezvous Tradeoffs
...Show More Authors

In this paper, we investigate and characterize the effects of multi-channel and rendezvous protocols on the connectivity of dynamic spectrum access networks using percolation theory. In particular, we focus on the scenario where the secondary nodes have plenty of vacant channels to choose from a phenomenon which we define as channel abundance. To cope with the existence of multi-channel, we use two types of rendezvous protocols: naive ones which do not guarantee a common channel and advanced ones which do. We show that, with more channel abundance, even with the use of either type of rendezvous protocols, it becomes difficult for two nodes to agree on a common channel, thereby, potentially remaining invisible to each other. We model this in

... Show More
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Nov 24 2021
Journal Name
2021 Ieee Asia Pacific Conference On Postgraduate Research In Microelectronics And Electronics (primeasia)
Review of 3D Networks-On-Chip Simulators and Plugins
...Show More Authors

A comprehensive review focuses on 3D network-on-chip (NoC) simulators and plugins while paying attention to the 2D simulators as the baseline is presented. Discussions include the programming languages, installation configuration, platforms and operating systems for the respective simulators. In addition, the simulator’s properties and plugins for design metrics evaluations are addressed. This review is intended for the early career researchers starting in 3D NoC, offering selection guidelines on the right tools for the targeted NoC architecture, design, and requirements.

View Publication
Scopus (13)
Crossref (13)
Scopus Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
SPEECH RECOGNITION OF ARABIC WORDS USING ARTIFICIAL NEURAL NETWORKS
...Show More Authors

The speech recognition system has been widely used by many researchers using different
methods to fulfill a fast and accurate system. Speech signal recognition is a typical
classification problem, which generally includes two main parts: feature extraction and
classification. In this paper, a new approach to achieve speech recognition task is proposed by
using transformation techniques for feature extraction methods; namely, slantlet transform
(SLT), discrete wavelet transforms (DWT) type Daubechies Db1 and Db4. Furthermore, a
modified artificial neural network (ANN) with dynamic time warping (DTW) algorithm is
developed to train a speech recognition system to be used for classification and recognition
purposes. T

... Show More
View Publication Preview PDF